{"id":232,"date":"2023-09-24T18:51:36","date_gmt":"2023-09-24T18:51:36","guid":{"rendered":"http:\/\/techonauts.com\/?page_id=232"},"modified":"2025-05-02T20:34:23","modified_gmt":"2025-05-02T20:34:23","slug":"technology-coaching","status":"publish","type":"page","link":"http:\/\/techonauts.com\/de\/coaching\/technology-coaching\/","title":{"rendered":"Technologie Training"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Technologie Training<\/h2>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"1024\" src=\"http:\/\/techonauts.com\/wp-content\/uploads\/2023\/09\/Me_workshop.jpeg\" alt=\"\" class=\"wp-image-185 size-full\" srcset=\"https:\/\/techonauts.com\/wp-content\/uploads\/2023\/09\/Me_workshop.jpeg 498w, https:\/\/techonauts.com\/wp-content\/uploads\/2023\/09\/Me_workshop-146x300.jpeg 146w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p>Im IT-Markt ist es sehr wichtig, gut ausgebildetes Personal zu haben, das genau wei\u00df, wie man mit den eingesetzten L\u00f6sungen umgeht.<\/p>\n<\/div><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p>Wenn Sie andererseits eine neue L\u00f6sung kaufen und diese in Ihre Infrastruktur integrieren, ist es auch sehr wichtig, sich mit ihr vertraut zu machen. Neue Dinge zu lernen muss nicht m\u00fchsam und zeitaufw\u00e4ndig sein. Ein guter Trainer wei\u00df, wie man unterrichtet, damit die Teilnehmer den gr\u00f6\u00dftm\u00f6glichen Nutzen aus der Schulung oder einem Workshop mit dem Experten ziehen.<\/p>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Warum mit uns?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Training oder Workshop entworfen f\u00fcr ihre Bed\u00fcrfnisse<\/li>\n\n\n\n<li>Remote, Vorort oder eine Mischung, wir machen es wie sie es ben\u00f6tigen<\/li>\n\n\n\n<li>Wir schulen Sie in der Umgebung, die Sie kennenlernen m\u00f6chten<\/li>\n\n\n\n<li>Holen Sie sich Best Practices von Experten aus der Praxis<\/li>\n\n\n\n<li>Sie m\u00f6chten anschlie\u00dfend ein Handout oder eine Dokumentation haben, wir erstellen diese<\/li>\n<\/ul>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Welchen Workshop oder Training bieten wir an?<\/h3>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Moderner Digitaler Arbeitsplatz<\/li>\n\n\n\n<li>Virtuelle Desktop Infrastruktur (VDI)<\/li>\n\n\n\n<li>Goldene Master Images<\/li>\n\n\n\n<li>Enterprise Mobilit\u00e4t - Mobiles Endger\u00e4te Management<\/li>\n\n\n\n<li>Cyber-, Cloud- und Applikationssicherheit\n<ul class=\"wp-block-list\">\n<li>Cloud Security Posture Management (CSPM)<\/li>\n\n\n\n<li>Cloud Workload Protection (CWP)<\/li>\n\n\n\n<li>Code Security<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Sicherheitsdenkweise Training (Bewusstsein schaffen)<\/li>\n\n\n\n<li>WordPress training<\/li>\n<\/ol>\n\n\n\n<div style=\"height:22px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-2 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-1 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center work-main is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60)\">\n<h4 class=\"wp-block-heading has-pale-cyan-blue-color has-text-color has-poppins-font-family has-normal-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--30);font-style:normal;font-weight:600\">Sicherheitsdenkweise Training (Bewusstsein schaffen)<\/h4>\n\n\n\n<h3 class=\"wp-block-heading has-poppins-font-family has-content-heading-font-size\" style=\"font-style:normal;font-weight:600\">Was Sie bekommen<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ein gutes Gef\u00fchl Spam zu erkennen<\/li>\n\n\n\n<li>Welche Angriffsmethoden gibt es und welche sollten Sie kennen?<\/li>\n\n\n\n<li>Was ist Social Engineering und wie k\u00f6nnen Sie sich sch\u00fctzen<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center work-main is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60)\">\n<h4 class=\"wp-block-heading has-pale-cyan-blue-color has-text-color has-poppins-font-family has-normal-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--30);font-style:normal;font-weight:600\">WordPress Training<\/h4>\n\n\n\n<h4 class=\"wp-block-heading has-poppins-font-family has-content-heading-font-size\" style=\"font-style:normal;font-weight:600\">Was Sie bekommen<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Einf\u00fchrung Wordpress<\/li>\n\n\n\n<li>Plugins die Sie kennen sollten<\/li>\n\n\n\n<li>Best Practices<\/li>\n\n\n\n<li>Wartung<\/li>\n\n\n\n<li>Mehrsprachig<\/li>\n\n\n\n<li>Formulare<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-3 wp-block-group-is-layout-constrained\">\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center work-main is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60)\">\n<h4 class=\"wp-block-heading has-pale-cyan-blue-color has-text-color has-poppins-font-family has-normal-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--30);font-style:normal;font-weight:600\">Datenschutz und -sicherheit<\/h4>\n\n\n\n<h3 class=\"wp-block-heading has-poppins-font-family has-content-heading-font-size\" style=\"font-style:normal;font-weight:600\">Was Sie bekommen<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Umgang mit Anmeldeinformationen und Konten<\/li>\n\n\n\n<li>Wie sollten Sie mit Ihren Daten umgehen<\/li>\n\n\n\n<li>Wie k\u00f6nnen Sie Ihre Daten sch\u00fctzen<\/li>\n\n\n\n<li>Wie kann eine Compliance-Richtlinie f\u00fcr Ihr Unternehmen aussehen<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-4 wp-block-group-is-layout-constrained\">\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-4 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center work-main is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60)\">\n<h4 class=\"wp-block-heading has-pale-cyan-blue-color has-text-color has-poppins-font-family has-normal-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--30);font-style:normal;font-weight:600\">Moderner Digitaler Arbeitsplatz<\/h4>\n\n\n\n<h3 class=\"wp-block-heading has-poppins-font-family has-content-heading-font-size\" style=\"font-style:normal;font-weight:600\">Was Sie bekommen<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ben\u00f6tigte Komponenten<\/li>\n\n\n\n<li>\u00dcbersicht Software Beispiel<\/li>\n\n\n\n<li>Ger\u00e4te und Betriebssystem (OS)<\/li>\n\n\n\n<li>Beispiel Architektur und Workflow<\/li>\n\n\n\n<li>Vorteile und Anwendungsf\u00e4lle<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-5 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center work-main is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60)\">\n<h4 class=\"wp-block-heading has-pale-cyan-blue-color has-text-color has-poppins-font-family has-normal-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--30);font-style:normal;font-weight:600\">Virtuelle Desktop Infrastruktur (VDI)<\/h4>\n\n\n\n<h3 class=\"wp-block-heading has-poppins-font-family has-content-heading-font-size\" style=\"font-style:normal;font-weight:600\">Was Sie bekommen<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Beispiel Architektur und Workflow<\/li>\n\n\n\n<li>Anwendungsf\u00e4lle<\/li>\n\n\n\n<li>Verteilungsmethoden<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-6 wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-columns are-vertically-aligned-center is-layout-flex wp-container-core-columns-is-layout-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center work-main is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:var(--wp--preset--spacing--60);padding-right:var(--wp--preset--spacing--60);padding-bottom:var(--wp--preset--spacing--60);padding-left:var(--wp--preset--spacing--60)\">\n<h4 class=\"wp-block-heading has-pale-cyan-blue-color has-text-color has-poppins-font-family has-normal-font-size\" style=\"margin-top:var(--wp--preset--spacing--40);margin-bottom:var(--wp--preset--spacing--30);font-style:normal;font-weight:600\">Goldene Master Images<\/h4>\n\n\n\n<h3 class=\"wp-block-heading has-poppins-font-family has-content-heading-font-size\" style=\"font-style:normal;font-weight:600\">Was Sie bekommen<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Best Practices<\/li>\n\n\n\n<li>Applikationsintegration<\/li>\n\n\n\n<li>Benutzerprofil Handhabung<\/li>\n\n\n\n<li>Persistent vs. nicht-persistent<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:70px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group alignfull is-layout-constrained wp-container-core-group-is-layout-7 wp-block-group-is-layout-constrained\"><\/div>\n\n\n\n<div style=\"height:14px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Technology Coaching In the IT market it is very important to have a well trained staff which exactly know how to handle the solutions you have in place. On the other side, if you buy a new solution and integrate them in your Infrastructure, it is also very important to get familiar with them. To [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":508,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-232","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/pages\/232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/comments?post=232"}],"version-history":[{"count":32,"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/pages\/232\/revisions"}],"predecessor-version":[{"id":974,"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/pages\/232\/revisions\/974"}],"up":[{"embeddable":true,"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/pages\/508"}],"wp:attachment":[{"href":"http:\/\/techonauts.com\/de\/wp-json\/wp\/v2\/media?parent=232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}